You searched for: ""

  • 1 Day ILT, VILT

    Validate your technical skills and open doors to new possibilities of advancement with Microsoft Applied Skills.

    This learning path helps you prepare for the Implement security through a pipeline assessment using Azure DevOps. Learn how to configure and secure Azure Pipelines. You’ll also get opportunities to practice hands-on skills. These skills include configuring secure access to pipeline resources, configuring, and validating permissions, configuring a project and repository structure, extending a pipeline, configuring pipelines to use variables and parameters securely, and managing identity for projects, pipelines, and agents.

    The opportunity is yours to lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    Validate your technical skills and open doors to new possibilities of advancement with Microsoft Applied Skills.

    In this learning path, you practice implementing Azure Monitor to collect, analyze and act on monitoring telemetry from Azure environments. You learn to configure and interpret monitoring for virtual machines, networking, and web applications.

  • 1 Day ILT, VILT

    Secure storage for Azure Files and Azure Blob Storage

    In this learning path, you practice storing business data securely by using Azure Blob Storage and Azure Files. The skills validated include creating storage accounts, storage containers, and file shares. Also, configuring encryption and networking to improve the security posture.

  • 1 Day ILT, VILT

    Configure secure access to your workloads using Azure virtual networking

    In this learning path, you practice configuring secure access to workloads using Azure networking.

  • 1 Day ILT, VILT

    Deploy containers by using Azure Kubernetes Service (AKS)

    In this learning path, you practice deploying containers, container orchestration, and managing clusters on Azure Kubernetes Service. The skills validated include deploying, configuring, and scaling an Azure Kubernetes Service cluster. Also, deploying an Azure Container Registry instance and deploying an application into an Azure Kubernetes Service cluster.

  • 1 Day ILT, VILT

    Create computer vision solutions with Azure AI Vision

    Computer vision is an area of artificial intelligence that deals with visual perception. Azure AI Vision includes multiple services that support common computer vision scenarios.

    As of 13th June, the AI-102 Develop AI Solutions in Azure course has been updated and restructured by combining together these five 1-day AI courses into a single, comprehensive learning experience:

    This update provides learners with a more cohesive and in-depth journey through key AI concepts and applications.

     

  • 1 Day ILT, VILT

    Develop natural language processing solutions with Azure AI Services

    Natural language processing (NLP) solutions use language models to interpret the semantic meaning of written or spoken language. You can use the Language Understanding service to build language models for your applications.

    As of 13th June, the AI-102 Develop AI Solutions in Azure course has been updated and restructured by combining together these five 1-day AI courses into a single, comprehensive learning experience:

    This update provides learners with a more cohesive and in-depth journey through key AI concepts and applications.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    This session will explore how IoT Plug and Play enables solution builders to integrate IoT devices with their solutions without any manual configuration. And how a device uses to advertise its capabilities to an IoT Plug and Play-enabled application.

  • 1 Day ILT, VILT

    This session will explore what is the concept of Report Automation where you can create Advanced Dynamic Report in few steps. Working with few useful options while cleaning & preparing data. Designing a data model with non-active relationship which help us in Realtime scenario. Will also make understand Customization in Dashboard.

  • 1 Day ILT, VILT

    This session will explore what is the concept of Data LakeHouse – a new, open data management architecture that combines the flexibility, cost-efficiency, and scale of data lakes with the data management and ACID transactions of data warehouses, enabling business intelligence (BI) and machine learning (ML) on all data. SQL Synapse now supports Data Architecture that can consist of Data Lake, Data Warehouse or a combination of both.

  • 1 Day ILT, VILT

    This Session will uncover how to use Spatial Analysis technology responsibly and how our AI technology works, and the choices system owners can make that influence system performance and behavior. How to focus on the importance of thinking about the whole system including the technology, people, and environment.

  • 1 Day ILT, VILT

    Azure Sentinel helps to collect, detect, investigate and respond to security threats and incidents. Thus, delivering intelligent security analytics and threat intelligence across the enterprise ecosystem. Azure Sentinel natively incorporates Azure Logic Apps and Log Analytics that enhances its capabilities. It also has built-in advanced machine learning capabilities that can detect actors of threats and suspicious Behaviors that can significantly help security analysts to analyze their environment.

    The core objective of the session is understanding Microsoft Sentinel association with Log Analytics. Key aspects of the session would be exploring Data Connectors and using Azure Activity

  • 1 Day ILT, VILT

    This session will guide you how to connect Azure Boards with one or more GitHub repositories. And By connecting Azure Boards with GitHub repositories, you enable linking between GitHub commits, pull requests, and issues to work items. You can use GitHub for software development while using Azure Boards to plan and track your work. Azure Boards provides the scalability to grow as your organization and business needs grow.

  • 1 Day ILT, VILT

    The session will cover the basics of Azure Virtual Desktop and provide an implementation details of Windows 10 pool of VMs within the same.

  • 1 Day ILT, VILT

    This session will cover the basics of how to use the Cloud Adoption Framework—a set of documentation, implementation guidance, best practices, and tools that aid in aligning the strategy for business, people, and technology.

  • 1 Day ILT, VILT

    Learn how to migrate existing CentOS Linux servers to supported versions of Red Hat Enterprise Linux.

    The RH174: Managing CentOS Migrations and RHEL Upgrades course will enable customers to transition successfully from CentOS Linux to Red Hat Enterprise Linux. It also enables them to upgrade from one major version of RHEL to the next. This course provides an overview of the migration process and discusses how to avoid and mitigate risks. “Managing CentOS Migrations and RHEL Upgrades” will help users to move from CentOS Linux to RHEL, or to upgrade to a newer version of RHEL.

  • 1 Day ILT, VILT

    Develop and deploy event-driven auto-scaling serverless applications and functions

    Learn how to develop, deploy, and auto-scale event driven serverless applications on the Red Hat OpenShift Container Platform. Red Hat OpenShift Serverless enables developers and Site Reliability Engineers (SREs) to focus on the core business logic of their applications and functions by delegating operational concerns and infrastructure services to the Red Hat® OpenShift Serverless platform.

    This Red Hat course is based on Red Hat OpenShift Serverless 1.23 and OpenShift Container Platform 4.10.

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

  • 1 Day ILT, VILT

    Cloud Security: Essential Knowledge for the Modern Tech Professionals.

    The CSF1: Cloud Security Fundamental Level 1 course provides a brief introduction to information security risks associated with cloud computing. Students can use this course to review what they already know about cloud security and to pinpoint any gaps in their understanding. Students who are interested in working with cloud technology or who will be part of an organisation transitioning to the cloud will benefit from this course.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    For those of you who want to use Google Cloud, Microsoft Azure, or Amazon Web Services, cloud security is less about setting up a secure cloud and more about using it securely. After all, these companies have already spent a lot of money to make sure their systems are safe. Still, anyone who wants to set up their own cloud needs to think about more things. These include security architecture, protecting physical infrastructure, disaster recovery, maintenance, and a stable connection.

    Cloud security also helps businesses stay in line with international rules like the General Data Protection Regulation (GDPR). It can also prepare businesses for future rules, which are always being thought about. For example, to follow the GDPR, companies must make sure that their cloud was built with the right architecture and that security and privacy were taken into account throughout the design process. If they don’t, regulators may fine them a lot if a security breach happens.

  • -35%
    1 Day

    In this course, you explore generative AI (Gen AI) use cases across specific industries using Google Cloud.

    After discussing generative AI in general, you will do a deep dive into two generative AI use cases and then explore your own use case within the same framework. This course targets professionals across different roles, including business analysts, data scientists, software developers, business users, and decision-makers, who are specifically interested in leveraging generative AI for business solutions.

  • -30%

    GCP-WEPGAI: Writing Effective Prompts for Generative AI

    Original price was: RM1,200.00.Current price is: RM840.00.
    1 Day ILT, VILT

    As generative AI becomes more common, the ability to interact with large language models is shifting from niche knowledge to a necessary skill across many different industries and roles.

    In this course, you will learn the fundamentals of prompting large language models and exploring further techniques for improving the output from large language models. You will also explore similar concepts when working with multimodal models such as Gemini Vision Pro.

  • -30%

    GCP-GAIDM: Introduction to Generative AI for Decision Makers

    Original price was: RM1,200.00.Current price is: RM840.00.
    1 Day ILT, VILT

    This course is designed for business users, business leaders, and, more generally, decision makers within organizations who are seeking to gain a comprehensive understanding of generative AI and its potential impact on their businesses.

    The overall goal of the course is to educate decision makers on the potential impact generative AI can have in their organizations, educate them about generative AI services on Google Cloud and to inspire decision makers to start thinking about what is possible with generative AI technologies.

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

Go to Top